DATA SECURITY

Global VM Market Sees Strong Growth Due to Rise in Cyber Threats, Finds Frost & Sullivan

Frost & Sullivan | October 07, 2021

Frost & Sullivan's recent analysis on the Global Vulnerability Management Market finds that enterprises are becoming more vulnerable to cyber-attacks as they embrace digital transformation initiatives. This is due to an expanded attack surface resulting from multiple touchpoints through an open network and easy accessibility to databases and applications. An expanded attack surface has triggered the need for greater investments in vulnerability management (VM) solutions. Given this demand, the global VM market is expected to reach $2.51 billion by 2025, expanding at a compound annual growth rate (CAGR) of 16.3%.

From a regional perspective, North America will continue to dominate the VM market over the forecast period. The recent executive order to improve US cybersecurity is one of the main demand drivers in the region. Europe, the Middle East, and Africa (EMEA) will be the second-largest VM market as a result of regulations such as General Data Protection Regulations (GDPR). Finally, the growing significance of cybersecurity among end-users and rapid digital transformation initiatives encourage organizations to embrace VM in APAC and Central and Latin America.

The COVID-19 pandemic and the resulting work-from-home economy have expanded organizations' attack surface. With organizations adjusting to a new mode of business operations, VM capabilities for emerging platforms and applications will gain traction,In addition, as businesses embrace network-attached endpoints, cloud-based applications, and connected devices, the need for managing vulnerabilities in the extended attack surface will surge.

                                                                                                                                                                                                                                                                                                            Swetha R Krishnamoorthi, Senior Industry Analyst, Cybersecurity at Frost & Sullivan

Swetha added: "Organizations' move toward holistic and focused security will encourage vendors to integrate capabilities from upstream, downstream, and alternative applications. Over the next decade, there will also be a likely emergence of an 'integrated security posture assessment tool' that provides end-to-end risk management for enterprises."

Increased threats amid higher numbers of connected devices and regulatory requirements for organizations to perform regular vulnerability scanning and remediation will present lucrative growth prospects for VM vendors, including:
  • Addressing end-to-end vulnerability management workflow through an integrated platform by having an extensive list of integrations that enable an organization to pull in data from different tools and trigger workflows on other platforms from a single pane of glass.
  • Focusing on emerging economies and identifying local distribution partners and value-added resellers to boost expansion initiatives in emerging markets.
  • Leveraging managed security service providers (MSSPs) as a revenue source to expand the customer base by developing a separate pricing model that works well for both MSSPs and customers, ensuring profitability.
  • Expanding asset-type coverage to a non-conventional environment through strategic partnerships or inorganic deals with operational technology security vendors to hasten the acquisition of capabilities and achieve growth.

Global Vulnerability Management Market, Forecast to 2025 is the latest addition to Frost & Sullivan's Information & Communication Technology research and analyses available through the Frost & Sullivan Leadership Council, which helps organizations identify a continuous flow of growth opportunities to succeed in an unpredictable future.

About Frost & Sullivan
For six decades, Frost & Sullivan has been world-renowned for its role in helping investors, corporate leaders and governments navigate economic changes and identify disruptive technologies, Mega Trends, new business models, and companies to action, resulting in a continuous flow of growth opportunities to drive future success.

Spotlight

Historically, cybersecurity has been an area that is housed solely in the technology department of a company, whether that consists of one or twenty employees. But more and more executives are understanding the importance of being not only knowledgeable but also involved in the conversations and decision-making process when it comes to protecting their data.

Spotlight

Historically, cybersecurity has been an area that is housed solely in the technology department of a company, whether that consists of one or twenty employees. But more and more executives are understanding the importance of being not only knowledgeable but also involved in the conversations and decision-making process when it comes to protecting their data.

Related News

DATA SECURITY

In one of the largest funding rounds in cybersecurity, CYE paves its way to hyper-growth, securing $100 million

prnewswire | February 10, 2021

CYE, the business chief in cybersecurity streamlining arrangements, declared today that it has brought more than $100 million up in a financing round, drove by the worldwide venture association EQT, with cooperation from existing financial backer, 83North. The venture - follows 5 years of organization and will be utilized to proceed with CYE's hyper-development in the worldwide market. Since its origin in 2012, CYE has been focused on aiding its clients assume full responsibility for their cybersecurity stances by empowering security pioneers to distinguish which business resources are in danger, focus on them dependent on basic business sway, and execute financially savvy remediation projects for ideal danger anticipation. Hyver, CYE's lead item, utilizes progressed calculations and diagram demonstrating to direct an exhaustive cybersecurity appraisal, covering the whole association, just as outsider merchants. Profoundly experienced 'red groups' at that point perform genuine, non-reproduced assaults, permitting CYE to precisely anticipate conceivable assault courses, enabling clients to forestall such assaults before they happen, just as the information on where assets should be contributed.

Read More

DATA SECURITY

70% of Financial Organizations Are Concerned About Insider Data Theft During Remote Work

prnewswire | October 27, 2020

Netwrix, a cybersecurity merchant that makes information security simple, today declared monetary market discoveries from its 2020 Netwrix Cyber Threats Report. Netwrix directed this online overview in June 2020 to see how the pandemic and following work-from-home activities changed the IT hazard scene. Of the apparent multitude of verticals the online study investigated, the money related industry displayed the most extraordinary changes in cybersecurity needs. Worry about VPN misuse soar, with an astounding 94% of respondents naming it a top security hazard. Stress over gracefully chain bargain additionally took off, from half to 97%. The quantity of associations organizing intentional information burglary dramatically increased, from 30% pre-pandemic to 70% now, while worry about incidental information sharing dropped from 80% to half. Notwithstanding this expanded worry about vindictive action, the most generally detailed occurrences included human blunders: 48% of respondents had clients succumb to phishing assaults in the initial hardly any months of the pandemic, 31% endured ill-advised information sharing, and 28% experienced episodes brought about by administrator botches. Different discoveries of the overview include: 30% of monetary associations feel they are at more prominent cybersecurity hazard now than they were pre-pandemic. The lion's share (64%) are worried about both more regular cyberattacks and the security holes brought about by far off work. 14% of respondents announced a flexibly chain bargain since the pandemic started. Despite the fact that this function is viewed as a basic danger by practically all monetary associations now, the casualties were especially delayed in distinguishing it: 76% required days, weeks or months. Uncertain information sharing took the longest to recognize: 51% expected days to hail the episode, while 19% required weeks and 11% required months. "In the money related area, worry about pernicious admittance to touchy information soar in the initial hardly any months of the pandemic, more so than in some other vertical. Notwithstanding, most of occurrences at budgetary associations during that period were really brought about by the human component. To limit both malevolent and unintentional information misfortune, this industry should notice cybersecurity specialists, who suggest consolidating normal end-client preparing with adaptable arrangements that can proactively distinguish and secure touchy information and spot assaults before they become breaks," said Ilia Sotnikov, VP of Product Management at Netwrix. About Netwrix Netwrix makes information security simple, in this way disentangling how experts can control delicate, controlled and business-basic information, paying little heed to where it lives. In excess of 10,000 associations overall depend on Netwrix answers for secure delicate information, understand the full business estimation of big business content, pass consistence reviews with less exertion and cost, and increment its efficiency groups and information laborers. Established in 2006, Netwrix has acquired in excess of 150 industry grants and been named to both the Inc. 5000 and Deloitte Technology Fast 500 arrangements of the quickest developing organizations in the U.S.

Read More

DATA SECURITY

Deloitte to Acquire Digital Terbium Labs, Risk Protection Solution Provider, to Expand its Offerings towards Threat Intelligence

Deloitte | June 21, 2021

Deloitte has announced its acquisition of assets of Terbium Labs, a Baltimore-based digital risk protection company. Terbium Labs helps organizations detect and remediate data theft, exposure, or misuse across the digital landscape. All services and solutions of Terbium Labs will join the cyber practice of Deloitte in its Detect & Respond operation services. These services by Terbium Labs include a platform for digital risk protection for leveraging artificial intelligence and patented data fingerprinting technologies and machine learning for identifying illicit use of sensitive online data. Including Terbium Labs, in 2021, it is the third cyber acquisition of Deloitte. It has previously acquired Root9B, LLC (R9B), a cyber-threat hunting provider, and CloudQuest, a cloud security posture management provider. Deloitte demonstrates its commitment to aiding global clients in managing all the cyber threats in running the businesses smoothly in all digital platforms through these acquisitions. According to Deloitte & Touche LLP’s Deloitte Risk & Financial Advisory's infrastructure solution leader and principal, Kieran Norton, finding complex or exclusive data once it leaves an establishment's limit can be exceptionally challenging. Advanced online threat intelligence, paired with remediation of data risk disclosure, needs a balance of progressive technology, a keen understanding of monitoring compliance, and acceptable alteration with an establishment's commercial needs and risk outline. Adding to it, Deborah Golden, Deloitte & Touche LLP’s Deloitte Financial and Risk Advisory Cyber and Strategic Risk leader and the principal said that their industry-leading cyber practice is dedicated to providing our customers with novel and ground-breaking ways to alter their cyber risk postures as they endeavor to reinforce their conviction equity, flexibility, and safety.

Read More